How to safely shop on eBay!

ebay_logo

With today’s internet technology, you can pretty much buy anything with the click of a mouse.. literally. Companies like eBay and amazon give sellers the ability to profit off their goods, while at the same time helping others seek whey desire. Unfortunately eBay buyers and others do not fall short of becoming the victim of countless scams and fraudulent products.

We’ve come up with a list of procedures you should check before purchasing from sellers online. We hope these will be sufficient enough to make your chances of a scam, less.

CHECK THE SELLER’S COMMENTS AND POSITIVE FEEDBACK

When you’re interested in purchasing an item, make sure you check the feedback before pressing submit & pay. A lot of sellers have a positive or negative feedback on their profile. If you need more negative than positive, it might not be a good idea to proceed.

USE CAUTION WHEN PURCHASING FROM A NEW SELLER ACCOUNT

Many scammers will create brand new seller accounts, in an effort to avoid being detected. If the account is new, there is no feedback, use caution. You might want to see if there’s a better deal from another seller.

AVOID SELLERS WHO WANT TO RECEIVE PAYMENTS IN OTHER WAYS

eBay and others have strict policies on how payments can be sent to the seller. eBay mostly prefers you use their website or PayPal to send transactions. Avoid sellers who want you to take payments off eBay’s website and request money orders or gift cards.

READ THE ITEM’S DESCRIPTION BEFORE PROCEEDING WITH PURCHASE

As much as we hate to say it, many buyers have failed to read the description of items before purchasing. Scammers will add in small bits of text, saying something to the effect of “This is a PlayStation One picture”, while the buyer misses that part, believing it is an actual PlayStation One console.

ONLY PURCHASE FROM REPUTABLE WEBSITES

Avoid buying from websites that are completely unknown to you. If you search for an item and stumble across http://www.johndoesstuff.com, you might want to avoid it, especially if it cannot be proven to be reputable.

With these mentioned, we hope it’ll better protect you and your friends, in avoiding online scams!

 

Texas Wants To Close Loophole In Online Predators Law

img_0628

A Texas State Representative is pushing to close a loophole in the law designed to protect people from being victimized by predators online.

“The perpetrator uses non-physical forms of coercion such as blackmail to acquire sexual content… either photos or video of a child or an adult… to obtain money, or to engage in sex with the victim” State Representative Tony Dale said during a Monday Morning press conference at the Texas State Capitol in Austin.

“This new bill addresses a gap in law where it is currently not illegal to threaten or extort people to provide such material” Dale said, adding “If such material is published–as I said, that’s already illegal–but blackmailing people today for these purposes is not specifically illegal.”

Investigators will tell you the online anonymity provided by social media continues to be a big challenge to them in protecting potential victims from harm.

“You can be who you want to be, and unfortunately our children may start chatting with these individuals… believing they are one of their peers” said Captain Jerry Medders with the Texas Attorney General’s Office.

Dale is pushing for his bill to get a hearing before a Texas House committee.

http://www.ktsa.com

Sextortion and how to prevent it

img_0628

Cyber Crime Response Agency receives many calls per week from individuals reporting that an online sexual encounter took place, with the opposite sex on camera. These situations typically result in the other party threatening to post private images of the victim online, unless that victim pays an amount of money.

A lot of the reportees we receive are worried that they’ve committed a type of crime. This could be further from the truth. As long as both parties involved understand that both are legal adults, anyone can have any type of encounter with another.

So how exactly do these suspects find their victims? Many of them search Facebook for random Facebook accounts, while others post in personals online. On Facebook, it typically starts off with a random friend request from the opposite sex. Once the account owner accepts the friend request, the suspect will then attempt to entice and encourage the account owner to come on camera, to engage in sexual activities. The threat can occur at any time, from the middle to the end of the encounter. Threats typically consist of statements that videos or pictures have been saved and will be posted or sent to family, if an amount of money isn’t sent.

Humiliating, right? So how can you avoid these types of situations? Simple! Don’t have them. Although crimes aren’t being committed by having the encounter, you have to take into consideration, the possibilities of threats. Should you fall for these types of crimes, do not make payment to anyone, for any reason, no matter how severe the threat is. In our experience, 95% of suspects to threaten, do not actually follow through with their threats. Why? Because they have nothing to gain from it.

You can make reports of these situations to the Federal Trade Commission at 1-877-FTC-HELP.

Do vigilante groups truly help against online predators?

FENT__1380715430_online-safety

We’ve all heard at some point, either on the news or online, that a group of individuals have assisted or have “busted a predator” themselves. Sounds like a great way to put an end to online pedophilia, right? Well, there are negative consequences that many are unaware of.

The phrase, “don’t bite off more than you can chew” fits right into this particular scenario. Law enforcement around the country are always dealing with reports of online pedophilia. If you’ve read articles on certain online groups, you’ve probably seen the many vigilante groups and members who are getting themselves into hot water. So what exactly does “hot water” mean?

CCRA has spoken to members of many vigilante groups, who’ve admitted in some point in their online decoy operations, they’ve had negative encounters with law enforcement and civil attorneys. When asked what this entailed, they explained that attorneys have contacted them, bringing suit against them for false accusations, defamation of character, and many other areas. Law enforcement has also asked them to stop meeting predators who they meet online, in person, regardless of state or country.

When CCRA asked law enforcement about this, they made it perfectly clear that that civilians who are not contracted, affiliated, or partnered with law enforcement agencies, should not be attempting to apprehend online predators. This includes chatting with predators online, collecting their personal information for personal gain, meeting in person and recording those in person encounters.

What’s the big deal? According to our meetings with law enforcement, individuals who are not one of the following above, who do not have the authority or power to attempt to stop predators as individuals or groups, are either at risk of impersonating law enforcement, destroying an on-going investigation, and setting themselves up for civil suit, since the predator the groups are dealing with, have not been convicted in a court of law. Believe it or not, these civil suits can and will be a win for the suspected predator.

With the largely growing number of predators, how in the world is the online community supposed to support and protect their community, both physically and online? Law enforcement stated that online observations and reports to law enforcement are sufficient enough and do not pose a threat to themselves, or law enforcement investigations.

How does CCRA avoid these mentioned issues? CCRA does not perform decoy operations or interact the predator or victim. Our operations are solely visual and will remain that way, unless otherwise instructed by a law enforcement agency. If a law enforcement agency instructs you to do such tasks, you are then brought under their protection, which should be documented on a form, which both parties can sign.

Although it’s know that the laws have not yet caught up to the internet, all civilians should steer clear of attempting to apprehend, meet with, and communicate with predators as a decoy, as many call themselves.

Facebook alert: Video Sent in Message

Cyber Crime Response Agency would like to advise and warn all Facebook users that a current hacking attempt is ongoing. The hacking attempt will appear in the form of a video, sent to you on messenger. The video will appear with your profile picture and your name. Do not click on this, as it will cause your account to be disabled. According to Facebook Help Page, there is no suggested fix for this at the moment.

Lee County man arrested in online predator sting

s

A Golden Gate man was arrested Wednesday after he asked an undercover detective who posed as a 12-year-old girl on social media for nude pictures and tried to meet the fictitious girl “with the goal to engage in sexual activity,” according to the Lee County Sheriff’s Office.

William Gregory Vega, 26, faces three felony charges of obscene communication — using a computer to seduce/solicit/lure a child, traveling to meet a minor to engage in sexual activity, and lewd and lascivious exhibition using a computer — and one felony charge of public order crimes for using a two-way communication device to facilitate a felony. Vega was booked at the Lee County Jail on $45,000 bond.

Wednesday while investigating possible narcotics leads, an undercover detective using an “investigative Facebook account” received a Facebook message from a user named “Greg Vega,” according to a sheriff’s office arrest report.

The detective responded to Vega and told him that his name was “Shelly” and that “Shelly” was using her older sister’s Facebook account. When Vega asked for Shelly’s age, the detective said she will turn 13 in October, the report stated. Over the course of the lengthy online conversation, the two exchanged phone numbers, and Vega soon thereafter sent the detective a text message.

The text message conversation “quickly turned into one of a sexual nature,” deputies wrote, after Vega asked about nude pictures and inquired about Shelly’s dating habits.

When “Shelly” told Vega that her mother did not allow her to send pictures, Vega replied with “You gotta be more sneaky” and “She wrong you should be able to take pics,” the report stated. Eventually, Vega asked “Shelly” if she wanted to have sex and sent her a sexually explicit video of himself, according to the report.

Vega later asked “Shelly” if she wanted to “meet up,” and the two agreed to meet near the stage area of Riverside Park in Bonita Springs. Deputies then staked out the park and set up surveillance in and around it.

Deputies followed Vega as he made his way to the park, where he then sat down on a picnic table near the stage area, according to the report.

He “appeared to make eye contact” with the detective who was sitting on the stage, portraying 12-year-old “Shelly,” the report stated. Vega then began walking toward the detective, “making his intentions of contact clear and obvious,” and was arrested, according to the report.

Source: http://www.naplesnews.com/

Employment Scam Targets College Students

fbi-seal

In a public service message from the Federal Bureau of Investigation, released the 18th of January, the FBI spoke of an employment scam, targeting college students for the ending result of identity theft. Their public service announcement said as follows:

College students across the United States continue to be targeted in a common employment scam. Scammers advertise phony job opportunities on college employment websites, and/or students receive e-mails on their school accounts recruiting them for fictitious positions. This “employment” results in a financial loss for participating students.

How the scam works:

-Scammers post online job advertisements soliciting college students for administrative positions.
-The student employee receives counterfeit checks in the mail or via e-mail and is instructed to deposit the checks into their personal checking account.
-The scammer then directs the student to withdraw the funds from their checking account and send a portion, via wire transfer, to another individual. Often, the transfer of funds is to a “vendor”, purportedly for equipment, materials, or software necessary for the job.
-Subsequently, the checks are confirmed to be fraudulent by the bank.
The following are some examples of the employment scam e-mails:

“You will need some materials/software and also a time tracker to commence your training and orientation and also you need the software to get started with work. The funds for the software will be provided for you by the company via check. Make sure you use them as instructed for the software and I will refer you to the vendor you are to purchase them from, okay.”

“I have forwarded your start-up progress report to the HR Dept. and they will be facilitating your start-up funds with which you will be getting your working equipment from vendors and getting started with training.”

“Enclosed is your first check. Please cash the check, take $300 out as your pay, and send the rest to the vendor for supplies.”

Consequences of participating in this scam:

-The student’s bank account may be closed due to fraudulent activity and a report could be filed by the bank with a credit bureau or law enforcement agency.
-The student is responsible for reimbursing the bank the amount of the counterfeit checks.
-The scamming incident could adversely affect the student’s credit record.
-The scammers often obtain personal information from the student while posing as their employer, leaving them vulnerable to identity theft.
-Scammers seeking to acquire funds through fraudulent methods could potentially utilize the money to fund illicit criminal or terrorist activity.

Tips on how to protect yourself from this scam:

-Never accept a job that requires depositing checks into your account or wiring portions to other individuals or accounts.
-Many of the scammers who send these messages are not native English speakers. Look for poor use of the English language in e-mails such as incorrect grammar, capitalization, and tenses.
-Forward suspicious e-mails to the college’s IT personnel and report to the FBI. Tell your friends to be on the lookout for the scam.
-If you have been a victim of this scam or any other Internet-related scam, you may file a complaint with the FBI’s Internet Crime Complaint Center at http://www.IC3.gov and notify your campus police.